9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.641 Medium
EPSS
Percentile
97.9%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-21699 high
CVE-2023-21800 high
CVE-2023-21801 high
CVE-2023-21803 critical
CVE-2023-21823 high
CVE-2023-21689 critical
CVE-2023-21690 critical
CVE-2023-21817 high
CVE-2023-21693 high
CVE-2023-21816 high
CVE-2023-21805 high
CVE-2023-21812 high
CVE-2023-21701 high
CVE-2023-21688 high
CVE-2023-21822 high
CVE-2023-21820 high
CVE-2023-21695 high
CVE-2023-21694 high
CVE-2023-21700 high
CVE-2023-21685 high
CVE-2023-21799 high
CVE-2023-21818 high
CVE-2023-21697 high
CVE-2023-21811 high
CVE-2023-21684 high
CVE-2023-21692 critical
CVE-2023-21702 high
CVE-2023-23376 high
CVE-2023-21686 high
CVE-2023-21802 high
CVE-2023-21797 high
CVE-2023-21813 high
CVE-2023-21798 high
CVE-2023-21691 high
CVE-2023-21528 high
CVE-2023-21713 high
CVE-2023-21718 high
CVE-2023-21705 high
CVE-2023-21804 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5020863
support.microsoft.com/kb/5021112
support.microsoft.com/kb/5021123
support.microsoft.com/kb/5022835
support.microsoft.com/kb/5022872
support.microsoft.com/kb/5022874
support.microsoft.com/kb/5022890
support.microsoft.com/kb/5022893
support.microsoft.com/kb/5022894
support.microsoft.com/kb/5022895
support.microsoft.com/kb/5022899
support.microsoft.com/kb/5022903
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21528
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21684
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21685
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21686
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21688
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21689
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21690
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21691
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21692
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21693
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21694
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21695
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21697
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21699
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21700
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21701
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21702
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21705
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21713
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21797
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21798
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21799
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21800
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21801
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21802
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21803
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21817
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21818
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21820
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21822
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-SQL-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.641 Medium
EPSS
Percentile
97.9%